Andreas Jacobsson

Learn More
The amount of software that hosts spyware has increased dramatically. To avoid legal repercussions, the vendors need to inform users about inclusion of spyware via end user license agreements (EULAs) during the installation of an application. However, this information is intentionally written in a way that is hard for users to comprehend. We investigate how(More)
In this paper, we discuss various types of spyware programs, their behaviour, how they typically infect computers, and the propagation of new varieties of spyware programs. In two experiments, we investigate the occurrence and impact of spyware programs found in popular P2P applications. Based on the findings from the empirical investigations, we try to(More)
Personal privacy is affected by the occurrence of adware and spyware in peer-topeer tools. In an experiment, we investigated five file-sharing tools and found that they all contained ad-/spyware programs, and, that these hidden components communicated with several servers on the Internet. Although there was no exchange of files by way of the file-sharing(More)
We investigate the hypothesis that it is possible to detect from the End User License Agreement (EULA) if the associated software hosts spyware. We apply 15 learning algorithms on a data set consisting of 100 applications with classified EULAs. The results show that 13 algorithms are significantly more accurate than random guessing. Thus, we conclude that(More)
The domain of smart home environments is viewed as a key element of the future Internet, and many homes are becoming “smarter” by using Internet of Things (IoT) technology to improve home security, energy efficiency and comfort. At the same time, enforcing privacy in IoT environments has been identified as one of the main barriers for(More)
Several barriers to turn innovative ideas into growth-oriented businesses with a global outlook are identified. The Plug and Play Business concept is suggested to lower these barriers by making it possible for the innovator to plug into a network of actors or potential collaborators with automated entrepreneurial functions. A P2P paradigm with intelligent(More)
The amount of spyware increases rapidly over the Internet and it is usually hard for the average user to know if a software application hosts spyware. This paper investigates the hypothesis that it is possible to detect from the end user license agreement (EULA) whether its associated software hosts spyware or not. We generated a data set by collecting 100(More)
The significance of electronic information exchange in interorganizational cooperation is well-known. We will here focus on the particular requirements of SMEs. We describe a general “wrapper agent” solution based on open source freeware that makes it possible (in principle) for any business system to exchange information with any other business system. It(More)